What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.

Slides:



Advertisements
Similar presentations
Cryptology Making & Breaking Codes & Ciphers. AJ 1152 Cryptology Cryptography –Science of creating codes or ciphers Cryptanalysis –Science of breaking.
Advertisements

Computer Science CSC 474By Dr. Peng Ning1 CSC 474 Information Systems Security Topic 2.1 Introduction to Cryptography.
CS 6262 Spring 02 - Lecture #7 (Tuesday, 1/29/2002) Introduction to Cryptography.
1 ITNS and CERIAS CISSP Luncheon Series: Cryptography Presented by Addam Schroll, CISSP.
First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown and edited by Archana Chidanandan Cryptographic Tools.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Chapter 5 Cryptography Protecting principals communication in systems.
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
CSE331: Introduction to Networks and Security Lecture 18 Fall 2002.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Cryptography (continued). Enabling Alice and Bob to Communicate Securely m m m Alice Eve Bob m.
ITIS 3200: Introduction to Information Security and Privacy Dr. Weichao Wang.
Csci5233 Computer Security & Integrity 1 Cryptography: Basics (2)
McGraw-Hill©The McGraw-Hill Companies, Inc., Security PART VII.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Lecture 23 Symmetric Encryption
Computer Science CSC 774Dr. Peng Ning1 CSC 774 Advanced Network Security Topic 2. Review of Cryptographic Techniques.
Encryption Methods By: Michael A. Scott
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Introduction to Public Key Cryptography
Public Key Model 8. Cryptography part 2.
Chapter 12 Cryptography (slides edited by Erin Chambers)
8. Cryptography part 21 Rotor Machines Combine Substitution and Transposition Methods produce ciphers that are very difficult to break Rotor Machines in.
Tonga Institute of Higher Education Design and Analysis of Algorithms IT 254 Lecture 9: Cryptography.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Network Security (A Very Brief Introduction)
Introduction to Information Security Chapter II : Classical Ciphers.
Network Security. Security Threats 8Intercept 8Interrupt 8Modification 8Fabrication.
T TT The Cryptography Istituto Tecnico Industriale “E.Divini” San Severino Marche.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Day 18. Concepts Plaintext: the original message Ciphertext: the transformed message Encryption: transformation of plaintext into ciphertext Decryption:
Midterm Review Cryptography & Network Security
Chapter 20 Symmetric Encryption and Message Confidentiality.
CS526: Information Security Prof. Sam Wagstaff September 16, 2003 Cryptography Basics.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Basic Cryptography 1. What is cryptography? Cryptography is a mathematical method of protecting information –Cryptography is part of, but not equal to,
Day 37 8: Network Security8-1. 8: Network Security8-2 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key:
Cryptography Wei Wu. Internet Threat Model Client Network Not trusted!!
Chapter 21 Public-Key Cryptography and Message Authentication.
CSCI 5857: Encoding and Encryption
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 2 – Cryptographic.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Symmetric Cryptography, Asymmetric Cryptography, and Digital Signatures.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Encryption No. 1  Seattle Pacific University Encryption: Protecting Your Data While in Transit Kevin Bolding Electrical Engineering Seattle Pacific University.
Lecture 2: Introduction to Cryptography
Cryptography 1 Crypto Cryptography 2 Crypto  Cryptology  The art and science of making and breaking “secret codes”  Cryptography  making “secret.
Overview of Cryptography & Its Applications
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
15-499Page :Algorithms and Applications Cryptography I – Introduction – Terminology – Some primitives – Some protocols.
Lecture 23 Symmetric Encryption
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Symmetric Cipher Model Plaintext input 1- encryption algorithm 2- secret key Encryption Cipher text output Cipher text input 1- Decryption algorithm 2-
MM Clements Cryptography. Last Week Firewalls A firewall cannot protect against poor server, client or network configuration A firewall cannot.
CS526Topic 2: Classical Cryptography1 Information Security CS 526 Topic 2 Cryptography: Terminology & Classic Ciphers.
INCS 741: Cryptography Overview and Basic Concepts.
Cryptography services Lecturer: Dr. Peter Soreanu Students: Raed Awad Ahmad Abdalhalim
Computer Security By Rubel Biswas. Introduction History Terms & Definitions Symmetric and Asymmetric Attacks on Cryptosystems Outline.
1 Introduction to Cryptography Chapter-4. Definitions  Cryptography = the science (art) of encryption  Cryptanalysis = the science (art) of breaking.
Cryptography Presented By: Yogita Dey Amardeep Kahali Dipanjan Devnagar Minhaajuddin Ahmad Khan ECE4, NIT Securing the Information Age.
Security through Encryption
Introduction to Symmetric-key and Public-key Cryptography
Presentation transcript:

What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google Image search for cryptography →

Cryptanalysis A system is “broken” if there exists a technique to decrypt a message that is at all faster than brute-force A larger keyspace is always more secure Trade-offs exist with large keys i.e. if you need a 3 million bit key to guarantee 100% security but a 256 bit key gives you 99%...

Models of Attackers Ciphertext only attack (weakest system) –Can discern the key from only 1 ciphertext Known plaintext attack –Has both the unencrypted and encrypted message Chosen plaintext attack –Can chose the message and see the encrypted version Chosen text attack (strongest system) –Can select message OR ciphertext at will

Classical Cryptography Time period: 4500 BC – 1946ish Stenography (sort of) Substitution Ciphers (and Vigènere Ciphers) One Time Pad Transposition Ciphers Polyalphabetic Ciphers Codes All WWII crypto systems (Enigma, Purple, etc) Modern systems are distinguished by use of mathematical systems and proofs of security

One-Time Pad XOR a message with a random key of the same length Provably secure! Given any ciphertext of length m it can be decrypted to every message of length m Key can only be used once (or it is broken) Difficult to distribute keys

Substitution (Caesar) Cipher OS IS NEARLY OVER = QY AY MCKBXW QZCB ROT-13 Vulnerable to frequency analysis – ciphertext only attack succeeds nopqrstuvwxyz mqvdbyouzfpwh abcdefghijklm kijnctesalrxg

WWII Crypto: Engima A rotor style machine Key is how to set the rotors, reflector and the plugboard Keyspace ≈ First computer, Colossus, built in Bletchley Park by Alan Turing’s team to perform cryptanalysis on Enigma. Biggest weakeness was operator error

Modern Cryptography: DES Adopted by NIST as national standard in 1976 Developed by IBM as the Lucifer cipher A block cipher based on Feistel S-boxes

DES Structure

DES Problems 56-bit keys = broken in less than 24 hours Also vulnerable to chosen plaintext attacks Triple DES – run DES 3 times over the message with 2 different keys – is still practically secure Replaced with AES in 2002

Public Key: RSA Select two large primes, p and q. N = pq Φ(N)=(p-1)(q-1) (the # of #’s relatively prime to N) Select random E in [1, Φ(N)–1] Publish E and N -> public key ED = 1 mod Φ(N) -> D is the private key Encryption: C = M E modN Decryption: M = C D modN

RSA - Continued Can do digital signatures (sign your outgoing message with your private key, then their public key) Exponentiation is computationally expensive Most frequently used as a method for exchanging keys for a symmetric system Many other public key systems, el-gamal, elliptic curves etc.

Cryptographic Hash Functions One-way functions used as a checksum Important features: –“Impossible” to invert –Error-propagation –Fast –Few input collisions MD5 (128 bits, 1996), SHA-1 (160 bits, 2005), SHA-256, SHA-512

Key Distribution Diffie-Hellman Key Exchange Link-encryption End-to-end encryption Key distribution center Couriers Pigeons

Diffie-Hellman Key Exchange (1976) Relies on difficulty of modular logarithms Secure if g and p are chosen well (can be chosen in advance)

Link-Encryption Encrypts and decrypts all traffic at each communication link Advantage: Each user needs to manage only 1 key Disadvantage: You must be able to trust the links. Not realistic.

End-To-End Encryption Encrypted by sender with receiver’s key Advantage: Ensures privacy of the message contents Disadvantage: Requires each user to manage O(n) keys and system has O(n 2 ) keys total

Key Distribution Center Trusted third party See Kristen’s presentation!

Future Directions Quantum cryptography - can guarantee no eavesdropper. Creates a secure channel for exchanging keys. Identity-based encryption - your name is your public key. Eliminates key distribution problem. I ♥ MBC